SDIWC Digital Library

The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.

The Third International Conference on Digital Information Processing and Communications (ICDIPC2013)

This paper presents a novel authentication and encryption method for an RFID system. In this paper, DES (Data Encryption Standard), algorithm will be used to encrypt and verify accuracy data within ...

The search for one digital image among the vast quantity of images is a real dilemma when it is based on image content rather than metadata such as eigenvalues or frequency coefficients. The search ...

This paper presents a robust and optimized data compression and suppression based on DCT and Image overlapping methods to transfer panorama images through the Wireless Sensor Networks (WSN). First, ...

This paper presents a secure authentication method for Mobile IPv6. As a default IPsec is used for secure signaling messages between the Mobile Node and other agents in Mobile IPv6 networks. Mobile ...

In this study, we propose a new aggregate signature scheme with pairing-based cryptography that can describe the mixed/parallel structure of signers. Existing structured signature schemes are based ...

In this paper, we go on to define and refine a basic security requirements taxonomy adapted to all context and systems, then our hierarchical model is used to enrich the first matrix (stake matrix) ...

In this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration ...

A multi-source multi-sink stochastic-flow network consists of a set of nodes, including sources nodes si that supply resources and sink nodes tj where demands are realized, and a set of directed arcs ...

This paper investigates the heteroscedasticity and non-stationarity, two statistical properties, of hyperspectral remote sensing data. In the field of mathematical sciences, a collection of variables ...

The SOFL three-step approach to the construction of formal specifications has been proposed and applied in information systems, but its effectiveness and applicability have not yet been demonstrated ...

This research work presents a new model in Wireless Sensor Network in which data aggregation is done by Multi Agent Systems and causes to prolong the network lifetime. A Time Division Multiple Access ...

Cancer is a fatal disease that causes large number of deaths all over the world; so many studies have been made on genes to study the behavior of this disease. Biclustering is one of the data mining ...

In this paper, we adapt the incremental Support Vector Machines, denoted by I-SVM to the medical field in order to solve the issue of monitoring system in Intensive Care Unit (ICU). In fact, we have ...

Software maintenance is an important phase of software lifecycle consuming the majority of effort. Program comprehension is the most time consuming activity during software maintenance. Data mining ...

The separation of the searched data from the rest is an important task in data mining. Three separation/classification methods are presented. Considering data as points in a metric space, the methods ...

In this research, we investigate an optimal method of commercial DBMS for analyzing large-scale web access log. Also, we develop the pre-processor in memory structure to improve performance and the ...

At this method using mutual information for selecting the size of Word document vectors for each category has been created according to the word of choice.
Documents obtained by using matrix measure ...

Determining the accuracy and duration of AI techniques is important for the reason that the Application of such techniques in Data mining has become wider. There is a range of techniques used in AI ...

In this paper, we examined the effects of financial news on Istanbul Stock Exchange and we tried to predict the direction of ISE National 100 Index open price after the news articles were published. ...

The current paper describes the information and communication system, based on micromechanical inertial sensors (MEMS) to measure the dynamic response and status of the vehicle suspension elements. ...

Efficient temperature aware design in modern portable computers is becoming increasingly important. As technology moves into deep submicron feature sizes, the static or leakage power is expected to ...

This paper presents a new approach to model and simulate a Stochastic digital wireless channel with a controlled value of Bit-Error-Rate (BER) for Point-to-Point (P2P) and Point-to-Multipoint (P2M) ...

A new current-mode Tow-Thomas biquad filter based on employing current differencing transconductance amplifiers (CDTAs) is introduced. The filter circuit uses two grounded capacitors and realizes a ...

The technological development of storage techniques and retrieval methods excite the managers of E-libraries to integrate this resources in their systems. In practice, the creation of these systems ...

In this paper we are presenting an intelligent system to extract objects in an image. We have to specify the shapes that need to be detected as well as its dimensions. Examples are given in the radar ...

To augment real planes with virtual objects, the camera pose relative to the planes must be estimated, which can be done by plane-based camera tracking. In plane-based camera tracking, robustness and ...

This paper deals with an error model and its evaluation in estimating the 3-D depth information using stereo camera system. This paper defines an error model
caused by stereo matching, and evaluates ...

Hands play a key role in human-computer interactions. Thus, this paper proposes a hand shape recognition method for implementing hand-based interfaces. The proposed method works robustly in real-time ...

Stereo image is frequently used as preprocessing of stereo vision techniques. Although stereo image rectification is performed using look-up tables which are computed in advance, it takes a long time ...

High complexity of computer-generated holography (CGH) is already well known to researchers in the field of optical engineering. Therefore, in order to improve the practicability of CGH, it should be ...

The article discusses the exploitation of ICT in tertiary education, particularly in the teaching of foreign language. The special focus is on eLearning courses which seem to be extremely beneficial ...

This paper examines the use of social network media at three aspects in Libyan context. Firstly, to use social network media as an open network learning environment that provide interaction necessary ...

Key Performance Indicator (KPI) delivery process is needed in the measurement of staff improvement and productivity in all types of organization as a feedback process. If the KPI delivery process is ...

This paper proposes and implements a novel content distribution model for reducing or minimizing delay in data dissemination. Currently, content distribution is based on two models: the Fluid model ...

This papers summarizes the use of neural networks as a business tool for analysis of insurance data in order to identify patterns. The primary focus of the paper examines the use of a neural network ...

Sedentary lifestyles and unhealthy diet are the main reasons of childhood obesity. This paper presents MyHealthyKids: Intelligent Web-mobile Children Obesity Intervention System for Primary School to ...

Over time, XML markup language has acquired a considerable importance in applications development, standards definition and in the representation of large
volumes of data, such as databases. Today, ...

The problem of realizing the Separation Of Concerns (SOC) principle is at the heart of the software crisis where crosscutting concerns tend to produce a messed
simulation systems by decreasing their ...

In this paper, A compact dual-band CPW-fed monopole antenna is simulated to improve its performances. The simulation is done using ADS software. The improvement include return losses, bandwidth, and ...